A method, system, and article of manufacture to share trusted hardware across multiple operational environments. A virtual machine monitor (vmm) is loaded to support a plurality of virtual machines in a computer system, the vmm including a vmm multiplexer. A first and a second virtual machine (vm) are loaded. A trusted hardware device is shared between the first vm and the second vm using the vmm multiplexer. In one embodiment, the trusted hardware device includes a trusted platform module (TPM).
|
19. A method, comprising:
loading an untrusted virtual machine monitor (vmm) to support a plurality of virtual machines in a computer system, the vmm including a vmm multiplexer;
loading a first and a second virtual machine (vm) supported by the vmm;
sharing a trusted hardware device between the first vm and the second vm using the vmm multiplexer;
receiving a request for a vmm service that is associated with the first vm, wherein the request comprises a challenger hash value;
determining a first vm platform configuration including a first hash value based on information measured from the first vm and a second vm platform configuration including a second hash value based on information measured from the second vm;
using a trusted hardware device shared between the first and the second vm to determine a stored compound hash value based on a combination of the first vm platform configuration and the second vm platform configuration;
computing a current compound hash value based on a combination of the first vm platform configuration including the challenger hash value and the second vm platform configuration including the second vm hash value;
determining whether the current compound hash value is equal to the stored compound hash value; and
executing the received request when the current compound hash value is equal to the stored compound hash value.
1. A method, comprising:
loading a virtual machine monitor (vmm) to support a plurality of virtual machines in a computer system, the vmm including a vmm multiplexer;
loading a first and a second virtual machine (vm) supported by the vmm;
determining a first vm platform configuration including a first hash value based on information measured from the first vm and a second vm platform configuration including a second hash value based on information measured from the second vm;
using a trusted hardware device shared between the first and the second vm to compute a compound hash value based on a combination of the first vm platform configuration including the first hash value and the second vm platform configuration including the second hash value;
storing the compound hash value in the trusted hardware device;
receiving a request for a vmm service that is associated with the first vm, wherein the request comprises a challenger hash value;
computing a current compound hash value based on a combination of the first vm platform configuration including the challenger hash value and the second vm platform configuration including the second vm hash value;
determining whether the current compound hash value is equal to the stored compound hash value; and
executing the received request when the current compound hash value is equal to the stored compound hash value.
15. A computer system, comprising:
a processor;
a trusted hardware device operatively coupled to the processor; and
at least one flash memory device operatively coupled to the processor, the at least one flash memory device including firmware instructions which when executed by the processor perform operations comprising:
loading a virtual machine monitor (vmm) in the computer system to support a first virtual machine (vm) and a second vm, the vmm including a vmm multiplexer;
loading the first vm and the second vm;
maintaining a first vm platform configuration including a first hash number and a second vm platform configuration including a second hash number by the vmm multiplexer; and
storing a compound hash number corresponding to a platform configuration based on a combination of the first vm platform configuration and the second vm platform configuration in the trusted hardware device;
receiving a request for a vmm service that is associated with the first vm, wherein the request comprises a challenger hash value;
computing a current compound hash value based on a combination of the first vm platform configuration including the challenger hash value and the second vm platform configuration including the second vm hash value;
determining whether the current compound hash value is equal to the stored compound hash value; and
executing the received request when the current compound hash value is equal to the stored compound hash value.
10. An article of manufacture comprising:
a storage device including a plurality of instructions which when executed perform operations comprising:
loading a virtual machine monitor (vmm) in a computer system to support a first virtual machine (vm) and a second vm;
loading the first vm and the second vm;
receiving a first vm platform configuration including information measured from the first vm;
computing a first virtual hash based on the first vm platform configuration;
receiving a second vm platform configuration including information measured from the second vm;
computing a second virtual hash value based on the second vm platform configuration;
sending the first virtual hash value and the second virtual hash value to a trusted platform module (TPM) of the computer system, the TPM to compute a compound hash value based on the first virtual hash value and the second virtual hash value;
receiving a request for a vmm service that is associated with the first vm, wherein the request comprises a challenger hash value;
computing a current compound hash value based on a combination of the first vm platform configuration including the challenger hash value and the second vm platform configuration including the second vm hash value;
determining whether the current compound hash value is equal to the stored compound hash value; and
executing the received request when the current compound hash value is equal to the stored compound hash value.
2. The method of
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
11. The article of manufacture of
12. The article of manufacture of
13. The article of manufacture of
14. The article of manufacture of
16. The computer system of
17. The computer system of
18. The computer system of
20. The method of
21. The method of
the compound hash value is stored in the trusted hardware device.
|
1. Field of Invention
The field of invention relates generally to computer systems and, more specifically but not exclusively, relates to sharing trusted hardware across multiple operational environments.
2. Background Information
In today's modern society, privacy issues have become a major concern. Modern technologies such as computers and the Internet enable people to access more information at rates never before possible. However, many of the tasks for which people use the Internet are considered highly private or confidential matters. For example, the Internet has streamlined tasks such as banking, filing tax returns, conferencing with business associates, and communicating with friends and family.
Coupled with the advantages that accrue from the Internet is an increased susceptibility to malicious eavesdropping and/or cyber-attack. Thus, as the tools with which people conduct their daily affairs advance in complexity, so too must the means by which private or confidential matters are safeguarded. As such, industry leaders have organized a Trusted Computing Group (TCG) to address these concerns.
TCG is an industry standards body, including computer manufacturers, device manufacturers, and software vendors, who are promoting the security of computing platforms and devices (see, https://www.trustedcomputinggroup.org). One goal of TCG is to promote a security hardware device called the trusted platform module (TPM). The TPM is described in specifications published by the TCG, such as the TPM Main Specification, Parts 1-3, Version 1.2, Oct. 2, 2003. The TPM is an isolated device built into the motherboard of a computer system for establishing trust and trust metrics in a Trusted Computing Environment.
Software vendors, such as Microsoft, have begun developing software platforms that will take advantage of the security features provided by a TPM device. Future versions of Microsoft Windows® are expected to provide numerous security functions, including encryption, privacy safeguards, and digital rights management with use of the TPM. However, today's Virtual Machine Monitors (VMMs) do not provide an abstraction to the physical TPM hardware of a platform to allow multiple Virtual Machines (VMs) to share a single physical TPM.
Not applicable.
Non-limiting and non-exhaustive embodiments of the present invention are described with reference to the following figures, wherein like reference numerals refer to like parts throughout the various views unless otherwise specified.
Embodiments of a method and system to share trusted hardware across multiple operational environments are described herein. In the following description, numerous specific details are set forth to provide a thorough understanding of embodiments of the invention. One skilled in the relevant art will recognize, however, that embodiments of the invention can be practiced without one or more of the specific details, or with other methods, components, materials, etc. In other instances, well-known structures, materials, or operations are not shown or described in detail to avoid obscuring aspects of the invention.
Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
Each of VM 110-114 behaves like a complete physical machine that can run its own OS. Usually, each VM session is given the illusion by VMM 104 that it is the only physical machine. VMM 104 takes control whenever one of the VMs 110-114 attempts to perform an operation that may affect the operations of other VMs to ensure the whole computer system 100 is not disrupted. Each of the VMs 110-114 supports a corresponding OS and firmware. Each OS can be different, as shown in
In one embodiment, VMM 104 is a firmware driver executing within a firmware environment known as the Extensible Firmware Interface (EFI) (Extensible Firmware Interface Specification, Version 1.10, Dec. 1, 2002, available at http://developer.intel.com/technology/efi.) EFI is a public industry specification that describes an interface between platform firmware and shrink-wrap operating systems or other application environments. The EFI specification includes provisions for extending BIOS functionality beyond that provided by the BIOS code stored in a platform's BIOS device (e.g., a non-volatile storage device.) More particularly, EFI enables firmware, in the form of firmware modules and drivers, to be loaded from a variety of different resources, including primary and secondary flash devices, option ROMs (Read-Only Memory), various persistent storage devices (e.g., hard disks, CD-ROM (Compact Disk-Read Only Memory), etc.), and from one or more computer systems over a computer network.
As illustrated in
Trusted VMs 110, 111, and 114 and their respective OS's may make TPM requests to the TPM asking the TPM to perform a particular action. In one embodiment, these requests may take the form of TPM commands as described in the TPM Main Specification, Part 3, version 1.2. A VMM TPM multiplexer 108 (denoted as “VMM TPM MUX”) allows TPM requests from VMs 110, 111 and 114 to be multiplexed to a single physical TPM 106.
TPM 106 includes a Core Root of Trust Measurement (CRTM) 228, an encryptor 230, a decryptor 232, a key generator 234, a random number generator (RNG) 236, a hash engine 238, and Platform Configuration Registers (PCRs) 240.
In one embodiment, TPM 106 provides various security functions. The TPM may perform asymmetric key functions for on-chip key pair generation using RNG 236. Hash values representing platform configuration information may be securely stored in the PCRs 240. The hash values enable verification of the platform configuration. In one embodiment, as shown in
A hashing function is an algorithm that turns a variable-sized data block into a fixed-sized hash value (a.k.a. a cryptographic checksum). Hashing functions are used to encrypt information. The hash engine 248 may support the secure hash algorithm-1 (SHA-1). TPM 106 may also include a hardware engine to perform Rivest-Shamir-Adleman (RSA) encryption and decryption.
The TPM may also provide an Endorsement Key (EK) that is a public/private key-pair. The private part of the key-pair is maintained within the TPM and not exposed outside of the TPM. The EK is unique to the particular TPM.
In a block 306, a first VM, shown as VM[i] in
It will be understood that embodiments of the present invention are directed to more than one VM sharing a physical TPM. In an alternative embodiment, a System Management Interrupt (SMI) Transfer Monitor (STM) may be loaded to support a System Management Mode (SMM) of a VM. In this instance, the STM acts as a virtual monitor similar to VMM 104, but supports execution of a management mode of operation for platform hardware 102, such as SMM. The trusted hardware may be shared by one or more SMMs and one or more VMs.
After all of the VMs have been launched, the logic continues to a decision block 312 to determine if the user wants a change to the trust policy. If the answer is yes, then the logic proceeds to a block 313 to change the trust policy. After the policy is changed, the logic proceeds to a block 314. If the answer to decision block 312 is no, then the logic proceeds to block 314 to determine which VMs are trusted based on the trust policy.
Continuing to a block 316, the OS[i]s are launched into their respective VM[i]s. Once the VMs and OS's are stabilized, the logic proceeds to a block 318 to multiplex requests to the TPM from the VMs.
VMM TPM Multiplexer 108 is a thin layer of software between the VMs and the TPM. In this way, the trusted logic remains with TPM 106. Also, in one embodiment, this allows the VMM to remain untrusted. Any security specific behavior demanded of the VMM is minimized.
Referring to
The TPM may be used to store secret information as a “blob” (Binary Large Object.) The TPM is used to create a blob and is used to return the content of a blob. Blobs may be used to store secret data or keys, such as symmetric encryption keys and signature keys. Secret data may include sensitive information such as credit card numbers, social security numbers, passwords, or the like.
In one example, the TPM may be used to store secret information by tying a blob to a configuration of a platform. This may be done through TPM Seal and Unseal commands. Sealing provides assurances that protected secrets are only recoverable when the platform is functioning in a specific known configuration. Information bound to a particular platform is only accessible by that platform if the conditions specified in the binding are met.
For the Unseal operation to succeed, proof of the platform configuration that was in effect when the Seal operation was performed must be provided to the TPM. If the blob is moved to another platform or the binding conditions of the blob are not met, access to the secret information in the blob is denied.
The Seal and Unseal operations may be used with the PCRs of TPM 106. Standardized assignments of PCRs to particular configuration information are disclosed in the TPM Main Specification, (Parts 1-3), Version 1.2, Oct. 2, 2003. Table 1 below describes the PCR assignments for PCRs 0-7. One embodiment of multiplexing multiple PCRs associated with multiple VMs to a PCR of a single physical TPM will be described below in conjunction with
TABLE 1
PCR Index
PCR Usage
PCR [0]
CRTM, BIOS and Platform Extensions
PCR [1]
Platform Configuration
PCR [2]
Option ROM Code
PCR [3]
Option ROM Configuration and Data
PCR [4]
Initial Program Loader (IPL) (usually the
Master Boot Record (MBR))
PCR [5]
IPL code Configuration and Data
(for use by the IPL code)
PCR [6]
State transition and wake events
PCR [7]
Reserved for future use
The PCR Usage column of Table 1 describes the type of configuration information that may be hashed into a hash value and then the hash value is stored in a corresponding PCR of the TPM. For example, information about the configuration of the Motherboard including hardware components and how they are configured may be measured to PCR[1]. In another example, code from an option ROM may be measured to PCR[2].
Continuing to a block 412 of flowchart 400, a virtual hash value for the VM[i] is computed. In one embodiment, the Multiplexer 108 executes the hash function to compute the virtual hash value. The input into the hash algorithm is based on configuration metrics of the VM such as those described above in conjunction with Table 1. Other examples of inputs into the hash algorithm include, but are not limited to, a portion of the OS kernel code, the code of various device drivers executing in the VM, or the like.
In a block 414, the virtual hash value is stored in a virtual PCR. The virtual hash values 401-403 may be stored in any storage device accessible by the computer system 100. In one embodiment, the virtual hash values 401-403 are stored in a flash memory device.
It will be understood that the virtual hash values 401-403 do not have to be maintained in a secure location in order to preserve the security of the compound hash value 405. Even if a hacker were to gain access to a single VM, the hacker could not discover the composite hash value. In one embodiment, the virtual hash values 401-403 are stored in a protected page of memory.
Continuing to a block 416, a compound hash value is computed based on the virtual hash values. In
Updates to a PCR may be referred to as “extending” the PCR, while the data measured to the PCR may be called the “extend.” Updates to the PCR are described by the following pseudo code:
PCRi New=HASH(PCRi Old value∥value to add).
In the embodiment of
It will be understood that to re-compute the compound hash value 405 all of the virtual hash values 401-403 must remain intact. Thus, if one of the virtual hash values 401-403 is corrupted, then the compound hash value 405 may not be able to be properly re-computed. Since the compound hash value 405 is used by the TPM for security operations, the net result would be that all trusted VMs would lose security capabilities with the TPM.
It will be understood that each particular VM will believe that the virtual hash value for a particular PCR is the “true” hash value. The virtual hash value will be used by the VM when interacting with systems outside of the computer system 100. Also, these outsider systems will believe that the virtual hash value is the “true” hash value of the TPM 106. However, security operations of the physical TPM 106 will be conducted using the compound hash value. The hash is considered a one-way computation in order to prevent a hacker from determining the inputted configuration information using the hash value.
Continuing in flowchart 400, the secret information is sealed using the compound hash value, as depicted in a block 418. The Seal operation generates a blob. Referring to
The Seal command is sent to VMM 104 where it is handled by the VMM TPM Multiplexer 108. The Multiplexer 108 computes the compound hash value 405 and uses this value in the Seal command sent to TPM 106. In response to the Seal command, TPM 106 generates blob 480. Blob 480 may be stored at a storage device accessible to computer system 100, such as, but not limited to, a hard disk, flash memory, or the like. The secret information sealed in the blob cannot be retrieved unless the TPM receives the correct PCR hash value corresponding to the VM platform configuration when the blob was originally sealed.
Proceeding to a block 454, a compound hash value is computed based on the challenger's hash value for the PCR. The compound hash value is computed by TPM 106 using the virtual hash values maintained by the VMM for that PCR and the PCR hash value provided by the challenger. The hash value provided by the challenger will be substituted for the stored virtual hash value for that PCR.
In a block 456, the compound hash value computed is compared against the compound hash valued stored in TPM 106 by TPM 106. Proceeding to a decision block 458, the logic determines if the two compound hash values match. If the answer to decision block 458 is yes, then the secret information is released to VM[i], as depicted in a block 460. If the answer to decision block 458 is no, then the secret information is not released to VM[i], as depicted in a block 462.
Examples of other requests that may be multiplexed to the TPM include use of the TPM's non-volatile memory and random number generator. The TPM may include non-volatile memory for use by the VMs. The VMM may provide an expanded virtual variant of the TPM non-volatile memory through flash memory or sealed information on disk. In the instance of the RNG, requests for random numbers from the TPM may be multiplexed to the various VMs.
Referring to
Returning to
Proceeding to decision block 512, the TPM request waits in the queue until the request is next in the queue for processing by the physical TPM. As shown in
Once the TPM request is next in the queue, the logic proceeds to a block 514 to commit the TPM request to the physical TPM. Proceeding to a block 516, the queue is updated since the TPM request has started processing. Continuing to block 518, if the VM requested an interrupt, an interrupt is sent to the VM[i] that issued the TPM request to notify the VM[i] that the TPM request has been completed. After block 518, the logic proceeds back to block 502.
Embodiments of the present invention allow multiple operational environments to share trusted hardware. In one embodiment, the multiple VMs are multiplexed to a single physical TPM using a VMM TPM Multiplexer. The Multiplexer provides a thin layer of software support to allow the VMs to share the TPM. In another embodiment, TPM requests from the VMs may be queued into order to manage equitable access to the TPM. In yet another embodiment, the VMM may maintain virtual PCR hash values for each VM. The virtual PCR hash values are translated into a compound hash value that is stored in the corresponding PCR of the physical TPM. The hash values are managed such that security operations are conducted in the physical TPM using the compound hash value.
Processor 702 may include, but is not limited to, an Intel Corporation x86, Pentium®, or Itanium® family processor, a Motorola family processor, or the like. In one embodiment, computer system 700 may include multiple processors.
Memory 704 may include, but is not limited to, Dynamic Random Access Memory (DRAM), Static Random Access Memory (SRAM), Synchronized Dynamic Random Access Memory (SDRAM), Rambus Dynamic Random Access Memory (RDRAM), or the like. Display controller 708 controls in a conventional manner a display 710, which may include a cathode ray tube (CRT), a liquid crystal display (LCD), an active matrix display, or the like. An input/output device 718 coupled to input/output controller 716 may include a keyboard, disk drive, printer, scanner and other input and output devices, including a mouse, trackball, trackpad, joystick, or other pointing device.
The computer system 700 also includes non-volatile storage 705 on which firmware and/or data may be stored. Non-volatile storage devices include, but are not limited to, Read-Only Memory (ROM), Flash memory, Erasable Programmable Read Only Memory (EPROM), Electronically Erasable Programmable Read Only Memory (EEPROM), or the like.
Storage 712 includes, but is not limited to, a magnetic hard disk, a magnetic tape, an optical disk, or the like. Some data may be written by a direct memory access process into memory 704 during execution of software in computer system 700. It is appreciated that instructions executable by processor 702 may reside in storage 712, memory 704, non-volatile storage 705 or may be transmitted or received via network interface 714.
For the purposes of the specification, a machine-accessible medium includes any mechanism that provides (i.e., stores and/or transmits) information in a form readable or accessible by a machine (e.g., a computer, network device, personal digital assistant, manufacturing tool, any device with a set of one or more processors, etc.). For example, a machine-accessible medium includes, but is not limited to, recordable/non-recordable media (e.g., a read only memory (ROM), a random access memory (RAM), a magnetic disk storage media, an optical storage media, a flash memory device, etc.). In addition, a machine-accessible medium can include propagated signals such as electrical, optical, acoustical or other form of propagated signals (e.g., carrier waves, infrared signals, digital signals, etc.).
It will be appreciated that computer system 700 is one example of many possible computer systems that have different architectures. For example, computer systems that utilize the Microsoft Windows® operating system in combination with Intel processors often have multiple buses, one of which may be considered a peripheral bus. Workstation computers may also be considered as computer systems that may be used with embodiments of the present invention. Workstation computers may not include a hard disk or other mass storage, and executable instructions may be loaded from a corded or wireless network connection into memory 704 for execution by processor 702. In addition, handheld or palmtop computers, which are sometimes referred to as personal digital assistants (PDAs), may also be considered as computer systems that may be used with embodiments of the present invention. A typical computer system will usually include at least a processor 702, memory 704, and a bus 706 coupling memory 704 to processor 702.
It will also be appreciated that in one embodiment, computer system 700 may execute operating system software. For example, one embodiment of the present invention utilizes Microsoft Windows® as the operating system for computer system 700. Other operating systems that may also be used with computer system 700 include, but are not limited to, the Apple Macintosh operating system, the Linux operating system, the Microsoft Windows CE® operating system, the Unix operating system, or the like.
The above description of illustrated embodiments of the invention, including what is described in the Abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes, various equivalent modifications are possible within the scope of the invention, as those skilled in the relevant art will recognize.
These modifications can be made to embodiments of the invention in light of the above detailed description. The terms used in the following claims should not be construed to limit the invention to the specific embodiments disclosed in the specification and the claims. Rather, the scope of the invention is to be determined by the following claims, which are to be construed in accordance with established doctrines of claim interpretation.
Zimmer, Vincent J., Rothman, Michael A.
Patent | Priority | Assignee | Title |
10073964, | Sep 25 2015 | Intel Corporation | Secure authentication protocol systems and methods |
10091184, | Jun 27 2013 | Intel Corporation | Continuous multi-factor authentication |
10176095, | May 05 2014 | Microsoft Technology Licensing, LLC | Secure management of operations on protected virtual machines |
10181037, | Nov 14 2014 | Microsoft Technology Licensing, LLC | Secure creation of encrypted virtual machines from encrypted templates |
10185679, | Feb 24 2016 | Red Hat Israel, Ltd.; Red Hat Israel, Ltd | Multi-queue device assignment to virtual machine groups |
10255425, | Sep 25 2015 | Intel Corporation | Secure authentication protocol systems and methods |
10303879, | Nov 06 2014 | AMAZON TECHNOLOGIES, INC , | Multi-tenant trusted platform modules |
10348711, | May 28 2010 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Restricting network access to untrusted virtual machines |
10528739, | Apr 20 2016 | Sophos Limited | Boot security |
10762209, | Apr 20 2016 | Sophos Limited | Boot security |
10831383, | Nov 02 2018 | Hamilton Sundstrand Corporation | Command line voting using hashing |
8032741, | Aug 22 2007 | Intel Corporation | Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM) |
8064605, | Sep 27 2007 | Intel Corporation | Methods and apparatus for providing upgradeable key bindings for trusted platform modules |
8068613, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
8074262, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for migrating virtual trusted platform modules |
8108668, | Jun 26 2006 | Intel Corporation | Associating a multi-context trusted platform module with distributed platforms |
8151262, | Mar 30 2007 | Lenovo PC International | System and method for reporting the trusted state of a virtual machine |
8249257, | Sep 28 2007 | Intel Corporation | Virtual TPM keys rooted in a hardware TPM |
8261054, | Aug 22 2007 | Intel Corporation | Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM) |
8266707, | Feb 28 2008 | Intel Corporation | Tamper resistant method, apparatus and system for secure portability of digital rights management-protected content |
8272002, | Aug 18 2006 | Fujitsu Limited | Method and system for implementing an external trusted platform module |
8290164, | Jul 31 2006 | Lenovo PC International | Automatic recovery of TPM keys |
8417965, | Apr 07 2010 | XILINX, Inc. | Method and circuit for secure definition and integration of cores |
8442224, | Jun 28 2010 | Intel Corporation | Protecting video content using virtualization |
8458480, | Jun 30 2005 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
8462945, | Jun 28 2010 | Intel Corporation | Protecting video content using virtualization |
8479264, | Sep 29 2006 | U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT | Architecture for virtual security module |
8522018, | Aug 18 2006 | Fujitsu Limited | Method and system for implementing a mobile trusted platform module |
8565437, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
8595483, | Jun 26 2006 | Intel Corporation | Associating a multi-context trusted platform module with distributed platforms |
8615788, | Aug 12 2009 | International Business Machines Corporation | Method and apparatus for scalable integrity attestation in virtualization environments |
8776028, | Apr 04 2009 | Parallels International GmbH | Virtual execution environment for software delivery and feedback |
8811619, | Oct 31 2008 | Dell Products, LP | Encryption key management system and methods thereof |
8953806, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
8953807, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
9141810, | Sep 29 2006 | U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT | Architecture for virtual security module |
9230081, | Mar 05 2013 | Intel Corporation | User authorization and presence detection in isolation from interference from and control by host central processing unit and operating system |
9235707, | Sep 26 2006 | Intel Corporation | Methods and arrangements to launch trusted, coexisting environments |
9298948, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
9311507, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
9386021, | May 25 2011 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Restricting network access to untrusted virtual machines |
9396093, | Apr 04 2009 | Parallels International GmbH | Virtual execution environment for software delivery and feedback |
9483662, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
9501665, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
9524400, | May 13 2005 | TAHOE RESEARCH, LTD | Method and apparatus for remotely provisioning software-based security coprocessors |
9591022, | Dec 17 2014 | The Boeing Company | Computer defenses and counterattacks |
9705869, | Jun 27 2013 | Intel Corporation | Continuous multi-factor authentication |
Patent | Priority | Assignee | Title |
6269409, | Sep 02 1997 | AVAGO TECHNOLOGIES GENERAL IP SINGAPORE PTE LTD | Method and apparatus for concurrent execution of operating systems |
20050076324, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Mar 17 2004 | ZIMMER, VINCENT J | Intel Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015120 | /0532 | |
Mar 17 2004 | ROTHMAN, MICHAEL A | Intel Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015120 | /0532 | |
Mar 18 2004 | Intel Corporation | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Nov 21 2012 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Feb 03 2017 | REM: Maintenance Fee Reminder Mailed. |
Jun 23 2017 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Jun 23 2012 | 4 years fee payment window open |
Dec 23 2012 | 6 months grace period start (w surcharge) |
Jun 23 2013 | patent expiry (for year 4) |
Jun 23 2015 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jun 23 2016 | 8 years fee payment window open |
Dec 23 2016 | 6 months grace period start (w surcharge) |
Jun 23 2017 | patent expiry (for year 8) |
Jun 23 2019 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jun 23 2020 | 12 years fee payment window open |
Dec 23 2020 | 6 months grace period start (w surcharge) |
Jun 23 2021 | patent expiry (for year 12) |
Jun 23 2023 | 2 years to revive unintentionally abandoned end. (for year 12) |